First published: Fri Feb 25 2011(Updated: )
A memory leak in rsyslog before 5.7.6 was found in the way deamon processed log messages are logged when $RepeatedMsgReduction was enabled. A local attacker could use this flaw to cause a denial of the rsyslogd daemon service by crashing the service via a sequence of repeated log messages sent within short periods of time.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/rsyslog | 8.2102.0-2+deb11u1 8.2302.0-1 8.2406.0-1 | |
Ubuntu Rsyslog | <5.7.6 | |
openSUSE | =11.4 | |
Debian | =8.0 | |
Debian | =9.0 | |
Debian | =10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-1488 is considered a medium severity vulnerability due to its potential to cause denial of service.
To fix CVE-2011-1488, upgrade rsyslog to version 5.7.6 or later.
CVE-2011-1488 affects rsyslog versions prior to 5.7.6 on multiple systems, including Debian and openSUSE.
CVE-2011-1488 is primarily a local attack vector, as it requires a local attacker to send repeated log messages.
Symptoms of CVE-2011-1488 exploitation include unexpected crashes or unresponsiveness of the rsyslogd daemon.